OMRF-ISG Archives

OMRF's Information Support Group


Options: Use Classic View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Topic: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Todd Walker <[log in to unmask]>
Sat, 16 Aug 2003 14:16:30 -0500
text/plain (20 lines)
Food for thought... many have pointed out that the Blaster worm could
have been easily set to do much worse damage than it actually was.
In fact, the author could have simply it to delete the C: drives of all
infected computers, or worse, on August 16th instead of doing a DOS
script against only, or it could have had a broader
definition of what to attack at MS as well, shutting down patching
completely.  The article below points out that the worm's release
forced millions of people to patch, stopping the chance of a much worse
worm later exploiting the RPC vulnerability.

Question of the day: could Blaster have been an intentional release by
either the US government, or less likely, MS itself?

Here's the article "The Bright Side of Blaster" from securityfocus